IT Systems  >   Business Systems  >   Security Systems  >  

IPS

RSS Feed   
IPS Reports
 
Light Agent or Agentless
sponsored by Kaspersky Lab
PRODUCT OVERVIEW: Virtual environments require a cybersecurity approach that goes beyond the scope of traditional systems. Download this features guide for an in-depth look at Kaspersky Security for Virtualization, an advanced network protection offering designed to improve threat detection speeds while offering the scalability needed for modern environments.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

Kaspersky Lab

Law Enforcement Technology Provider Bolsters Security and Improves Productivity for Diverse Customer Base
sponsored by Fortinet, Inc.
CASE STUDY: Law enforcement technology providers work within a niche market, so many of them operate as small businesses. As a result, it can be difficult to navigate security given its often complex architecture. Read this case study to learn how one of these providers was able to simplify their security with the help of Fortinet’s next-generation firewalls.
Posted: 20 Aug 2020 | Published: 10 Mar 2020

Fortinet, Inc.

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Your Guide to Mastering Vulnerability Remediation
sponsored by Vulcan
RESOURCE: In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.
Posted: 21 May 2020 | Published: 06 May 2020

Vulcan

MITRE ATT&CK Evaluations — APT29
sponsored by Trend Micro
WHITE PAPER: In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.
Posted: 22 Jun 2020 | Published: 21 Apr 2020

Trend Micro

A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

Threat Intelligence Driven Detect and Response Operations
sponsored by Bitdefender
WEBCAST: Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.
Posted: 23 Jul 2020 | Premiered: Nov 30, 2019

Bitdefender

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com
 
Browse by Report Type:
IPS White Papers | IPS Multimedia | IPS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info